Enabling Dynamic Authentication With Different Protocols on the Same Port for a Switch - The invention enables a client device that does not support IEEE 802.1X authentication to access at least some resources provided through a switch that supports 802.1X authentication by using dynamic authentication with different protocols. When the client device attempts to join a network, the switch monitors for an 802.1X authentication message from the client device. In one embodiment, if the client fails to send an 802.1X authentication message, respond to an 802.1X request from the switch, or a predefined failure condition is detected the client may be deemed incapable of supporting 802.1X authentication. In one embodiment, the client may be initially placed on a quarantine VLAN after determination that the client fails to perform an 802.1X authentication within a backoff time limit. However, the client may still gain access to resources based on various non-802.1X authentication mechanisms, including name/passwords, digital certificates, or the like.

2010-12-30

20100333177

SYSTEM AND METHOD FOR IDENTIFYING UNAUTHORIZED ENDPOINTS - In embodiments of the present invention improved capabilities are described for identifying unauthorized endpoints. The present invention includes computer implemented methods and systems for actively polling and monitoring network devices, such as network routers and switches, to obtain information on any or all of the endpoints on a network with which the router or switch may have communicated. Address information acquired through polling is compared with an authorized endpoint list, which is generated from information reported to the store by security agents on the authorized endpoints and which is stored in a security compliance store, in order to identify unauthorized endpoints. Methods and systems disclosed herein also include remediation measures to be taken on the unauthorized endpoints. Related user interfaces, applications, and computer program products are disclosed.

2010-12-30

20100333178

System and Method for Unique User Identification via Correlation of Public and Private Data by a Third-Party - The present invention is a system and method to provide the unique and persistent user identification of networked electronic devices (e.g., computers, mobile phones, game consoles, set-top boxes, etc.) and/or the users (the first-party) by correlating the public information received by a second-party with the private information available to a network access provider or other third-party and then the capability for the third-party to uniquely identify users/devices and provide data to second-parties. The invention is able to uniquely & persistently identify devices and users on a network without exchanging uniquely identifying information between the user/device and the content provider responding to the request (e.g., no reliance on passwords, cookies, challenge/response, encrypted strings.).

2010-12-30

20100333179

FILE SHARING SYSTEM AND METHOD - A file sharing system includes a web server, a first electronic device, and a second electronic device. The web server includes an authorizing module and a server storage module. The server storage module is capable of storing files uploaded from a first electronic device. The authorizing module is capable of recording an authorizing setting from the first electronic device to authorize a second electronic device to access the files in the server storage module.

2010-12-30

20100333180

DATA PROCESSING APPARATUS THAT REGISTERS INFORMATION NOTIFICATION DESTINATION AND METHOD THEREFOR, AND STORAGE MEDIUM - A capable of preventing reception and processing of large data acquired based on a query string, thereby making it possible to prevent data reception and processing from affecting another event notification or registration request processing performed by the data processing apparatus. When a query string determination section determines that destination information for identifying a notification destination contains a specific character string, an event notification destination registration-determining section determines that the notification destination of information concerning the data processing apparatus is not to be registered in an event notification information-storing section. A Web service response-returning section returns a response indicating that the notification destination has not been registered, to an information processing apparatus connected to the data processing apparatus.

2010-12-30

20100333181

SYSTEM AND METHOD FOR REMOTELY CONFIGURING A DESKTOP MAILBOX - A method and system for remotely configuring a desktop mailbox manager. A mobile node operable to communicate within a wireless network includes a remote desktop controller to generate configuration messages for transmission to a home node at which the desktop mailbox manager is located. When reconfiguration is required, reconfiguration criteria are formulated, usually at the direction of the user. The reconfiguration criteria are then used by the remote desktop controller to create a reconfiguration message, which is addressed for delivery to the home node. A network connection is established, and the reconfiguration message is transmitted. A network server associated with the base station through which the mobile node is communicating with the network routes the message to a server associated with the home node, utilizing an appropriate gateway if necessary. The message is stored on the server until the home node establishes communication and then the message is downloaded to the home node. In the home node, the message is used to reconfigure the desktop manager.

2010-12-30

20100333182

SYSTEM AND METHOD FOR ESTABLISHING A SELF-REALIZING EXPANDABLE COMMUNICATIONS NETWORK - This invention relates to a system and method for providing secure reliable expansion of a mobile network. The system includes one or more portable communications devices (PCDs) which incorporate routing, authentication and encryption capabilities and are adapted to provide a connection between a peripheral device and a base-station either directly or indirectly via other similarly configured PCDs. The PCDs also incorporate tamper-proofing features to provide added security.

2010-12-30

20100333183

IMAGE FORMING SYSTEM, IMAGE FORMING APPARATUS AND RECORDING MEDIUM - An image forming system includes an image forming apparatus, an information processing apparatus and a printer driver generator that generates a printer driver and a unique authentication key for the printer driver. The information processing apparatus gives the unique authentication key to a job generated according to the printer driver currently installed thereon, and transmits them to the image forming apparatus. And the image forming apparatus executes the job if the authentication key received therefrom and an authentication key recorded in the image forming apparatus are identical.

2010-12-30

20100333184

SYSTEM AND METHOD FOR AUTHENTICATION - A system and method for authentication including verifying a password is disclosed. In one embodiment, the authentication system includes a first storage unit to store an authentication sequence, a read-only memory unit to store an authentication algorithm, and a second storage unit. A microcontroller is coupled to the first storage unit, the read-only memory unit, and is configured to be coupled to and uncoupled from a host. The microcontroller is configured to execute the authentication algorithm to verify a password with the authentication sequence, and to send an access request to a web server via the host if the authentication algorithm has verified the password with the authentication sequence.

2010-12-30

20100333185

GENERATING SECURITY MATERIAL - An apparatus and method establish a secure, direct, station-to-station communication between a first station and a second station in a topology (e.g., PBSS) having a central secret holder/provider that allows secure, direct, station-to-station communications and that allows secure station-to-station broadcast communications. The first station and the second station will have previously established a security association (SA) with a topology control point (PCP). The method includes creating pair-wise unique material for the first station. The pair-wise unique material is computed as a function of (i) a known shared secret associated with the PCP, (ii) a first piece of unique data associated with the first station, and (iii) a second piece of unique data associated with the second station. The method includes securely communicating the pair-wise unique material from the first station to the second station.

2010-12-30

20100333186

TWO-WAY AUTHENTICATION USING A COMBINED CODE - An authentication process for a client and a target service to perform mutual authentication. A combined code is received that comprises a combined code hash of at least two sets of data from which an encoding scheme of the at least two sets of data can be determined. The two sets of data comprise a first set of data that includes a first hash of a public key associated with a certificate used to establish a secure channel with a target service, and a second set of data that includes a credential for authentication. The certificate can be validated with the first set of data included in the combined code. In response to a successful validation of the certificate, the credential from the second set of data can be provided to the target service for authentication.

2010-12-30

20100333187

SUBSCRIBER BASED POLICY FOR SERVICE NETWORK GATEWAYS - A subscriber network can provide services. External applications can use the services on the subscriber network. A service access gateway can control application access to services of the subscriber network. The service access gateway can filter requests from an external application to access services on the subscriber network based on the customer for which the external application is accessing the service.

2010-12-30

20100333188

Method for protecting networks against hostile attack - An address-hopping method is provided to enhance security in computer networks. In embodiments, the method is carried out at a network node and includes storing an IP address that is temporarily valid as a destination address for the node; sequentially updating the stored IP address, at least at specified intervals of time, with new values that are each temporarily valid; and conditionally accepting or rejecting incoming packets according to whether there is a match between the destination IP address of the incoming packet and the temporarily valid IP address currently stored in the memory.

2010-12-30

20100333189

METHOD AND SYSTEM FOR ENFORCING SECURITY POLICIES ON NETWORK TRAFFIC - A computer readable medium that includes computer readable program code embodied therein. The computer readable medium causes the computer system to receive, by a data link rule enforcer, a packet from a packet source of the packets, and obtain a data link rule applying to a data link. The data link is operatively connected to the packet source, and the data link is associated with a media access control (MAC) address. The computer readable medium further causes the computer system to determine, by the data link rule enforcer, whether the packet complies with the data link rule, and drop, by the data link rule enforcer, the packet when the packet fails to comply with the data link rule.

2010-12-30

20100333190

LATENCY REDUCTION METHOD AND NETWORK CONNECTION APPARATUS - A latency reduction method executed by a network connection apparatus, includes starting to output an incoming packet before an access control processing with respect to the incoming packet has completed, and changing the incoming packet to an invalid packet and outputting the invalid packet when determined by the access control processing to discard the incoming packet.

2010-12-30

20100333191

SYSTEM AND METHOD FOR PROTECTING CPU AGAINST REMOTE ACCESS ATTACKS - A system and method that provides for protection of a CPU of a router, by establishing a management port on a router. Hosts which are connected to a non-management ports of the router are denied access to management functions of a CPU of the router. The system and method can utilize an application specific integrated circuit, in conjunction with a CAM-ACL, which analyzes data packets received on the ports of router, and the ASIC operates to drop data packets which are directed to the CPU of the router. This system and method operates to filter data packets which may be generated in attempts to hack in to control functions of a network device, and the operation does not require that the CPU analyze all received data packets in connection with determining access to the control functions of the router.

2010-12-30

20100333192

Secure storage - A portable security storage unit is described, which comprises a firewall, access to networks and a hard drive external to a computer. A hard drive manager allows access to the external hard drive and provides encryption, decryption of data passing to and from the external hard drive as well as restore capability. The computer, which hosts the storage security unit, is coupled to the storage security unit by a USB connection, and the firewall and the hard drive manager are USB connected internal to the security storage unit.

2010-12-30

20100333193

System and Method for Protecting Data with Multiple Independent Levels of Security - A data security system includes a single central processing unit (CPU), a plurality of different security zones corresponding to different levels of security classification, a plurality of operating systems, a communications interface, a global zone, and a memory coupled to the plurality of security zones and the global zone. The CPU includes a plurality of processing cores and each security zone is associated with a different one of the processing cores. The global zone is communicatively coupled to the communications interface and the plurality of security zones, and is associated with a different one of the processing cores than the plurality of security zones. The global zone directs communications between the communications interface and the plurality of security zones. Each processing core executes a separate one of the plurality of operating systems, thereby providing separate processing capability on the single CPU for each of the different levels of security classification.

2010-12-30

20100333194

System, Method, and Apparatus for Capturing, Securing, Sharing, Retrieving, and Searching Data - This present invention relates to a system, method and apparatus for scientists and researchers and others to capture, secure, share, retrieve and search captured data. Said system and method is able to: fully-integrate hardware and software, required to seamlessly capture data inputs; combine edit and display functions from devices into one single edit and display platform; compile captured inputs from devices into text-searchable and tag-able data that can be displayed, edited and searched on one platform; compile captured inputs from devices into text-searchable and tag-able data that can be searchable by using free-text search, advanced search modules, or a combination thereof; provide advanced search modules that can search based on embedded text in files, tags tied to images or files, parallel image search and other intelligent parameter-based search formats; and can be provided as a hosted application, available via a wire line or wireless on-demand service, also referred to as Software as a Service (SaaS) delivery method.

2010-12-30

20100333195

PASSWORD PROTECTION SYSTEM - A password registering method used in an electronic device includes displaying one visual dial on a touch screen of the electronic device; recording rotation parameters of the visual dial rotated by a user, and generating input information according to the rotation parameters; and registering the password according to the generated input information the user's confirming the rotation operation.

2010-12-30

20100333196

Systems for Controlling Access to Locked Content Contained in a Recording Medium - A communication apparatus located remotely from an individual entering into communication with said apparatus, comprises a module for: receiving a key signal uniquely representative of an individual at a remote communication apparatus; further receiving a signal representative of a specific recording medium; determining a signal representative of one or more personal identification characters based on said key signal and said recording medium signal; and transmitting said signal representative of said personal identification characters.

2010-12-30

20100333197

SECURITY SYSTEM AND METHOD FOR GRANTING ACCESS - A method for granting access to change a security system from a locked state to an unlocked state includes: displaying a security access interface, wherein the security access interface comprises a graphical region, the graphical region is filled with a plurality of colors; selecting at least one color in the graphical region; at least recording at least one color property according to the at least one selected color; generating an input password at least according to the at least one recorded color property; determining whether the input password matches a predetermined password; and granting access if the input password matches with the predetermined password. A related security system is also provided.

2010-12-30

20100333198

AUTHENTICATION METHOD AND INPUT DEVICE - An authentication method and an input device are provided in which a password which a user has inputted in person can be easily reproduced, and it is unlikely for a password leak to occur even when peeped at. An authentication password includes position identification information disposed in an arbitrary position in an input section of an input device. Position identification information corresponding to a first indicated position of an input trajectory inputted from the input section is acquired. Based on the input trajectory, trajectory information representing repetitions of the trajectory from the first indicated position and movement information representing a movement direction with respect to the first indicated position are calculated. The acquired position identification information, and the calculated trajectory information and movement information are compared with preset setting information, and whether they correspond to the setting information is determined, thereby the authentication is carried out.

2010-12-30

20100333199

Method and system for scanning a computer system for sensitive content - A computer-implemented method for scanning a computer system for sensitive data. A scan manager manages a scan of files of a second computer. The scan manager receives a request to scan and identify files stored on the second computer based on at least one category of sensitive data. The scan manager receives scan report recipient information and generates a user profile based on the at least one category and the recipient information. The scan manager makes the user profile available to a category server for use in creating a scan profile defining the scan criteria and deploys a scan agent to a computer to conduct the scan based on the scan profile. When the scan is complete and upon creation of the scan report, the scan manager makes the scan report available to the intended recipients.

2010-12-30

20100333200

METHOD AND APPARATUS FOR SPAM MESSAGE DETECTION - A method, apparatus and computer program product for spam message detection. The method includes collecting time domain transmission characteristic of a message source; computing frequency domain transmission characteristic of the message source with the time domain transmission characteristic of the message source; and identifying the message source to be a spammer in response to the frequency domain transmission characteristic of the message source satisfying predefined criteria; wherein the steps of the method are carried out using a computer device. An apparatus and computer program product for carrying out the above method is also provided.

2010-12-30

20100333201

SYSTEM, METHOD, AND PROGRAM FOR DETERMINING VALIDITY OF STRING - A computer-implemented method, program product, and system for determining the validity of a string generated by a computer programming language program. The method includes: abstracting a constraint between variables extracted from a source code for a programming language, describing the constraint in M2L, and storing the constraint; and evaluating the validity of the string on an M2L solver on the basis of the constraint and a M2L specification to determine whether the string is safe or unsafe.

2010-12-30

20100333202

METHOD AND DEVICE FOR DEFENDING AGAINST ATTACKS TO SYSTEMS COMPRISING A PLUG & PLAY FUNCTION - Method for recognizing attacks to at least one interface of a computer system, in particular an automated self-service machine, comprising: monitoring the interface in order to determine changes at the interface; if changes occur, the change is used to determine the probability that an unallowed attack is occurring at the interface; if the probability is beyond a defined threshold, defensive maneuvers are introduced.

2010-12-30

20100333203

METHODS FOR DETECTING MALICIOUS PROGRAMS USING A MULTILAYERED HEURISTICS APPROACH - Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code.

2010-12-30

20100333204

SYSTEM AND METHOD FOR VIRUS RESISTANT IMAGE TRANSFER - A system and method for virus resistant image transfer, comprising a computer capable of accessing electronic sources of information, a connection to a local network, and a connection to the Internet, which enable virus resistant image transfer, by a user opening a computer connection, the user selecting data, the user generating an Internet optimized thumbnail image associated with the selected data, the user converting the selected data to an Internet optimized format, the user creating an Internet optimized pair of the selected data and the thumbnail image, the user compressing all Internet optimized pairs, the user connecting to a server, and the server authenticating the user.

2010-12-30

20100333205

Methods, Computer Networks and Computer Program Products for Reducing the Vulnerability of User Devices - Methods, computer networks, and computer program products that reduce the vulnerability of network user devices to security threats include scanning a user device connected to a network to determine whether the user device contains a particular version of an application; downloading the particular version of the application via the network in response to verifying that the user device does not contain the particular version of the application; installing the downloaded application on the user device; scanning the user device for security vulnerabilities; downloading a patch via the network in response to detecting a security vulnerability, wherein the patch is configured to remedy the security vulnerability; and executing the downloaded patch on the user device to remedy the detected security vulnerability.

2010-12-30

20100333206

Protecting a software component using a transition point wrapper - Embodiments of apparatuses, articles, methods, and systems for protecting software components using transition point wrappers are generally described herein. In one embodiment, an apparatus includes a first component, a wrapper component, and a management module. The wrapper component is to transform a transition point between the first component and a second component. The management module is to control access to the first component through the transformed transition point. Other embodiments may be described and claimed.

2010-12-30

20100333207

Systems and Methods for Auditing Software Usage Using a Covert Key - System and method for auditing for usage of licensed software in which a client executing the software generates and transmits a license key and a covert key to a server via network connection. The license key is transmitted to the server upon activation of the licensed software at the client. The covert key is generated based on at least a portion of the software code activated at the client and is transmitted to the server at random or at predetermined time intervals after transmission of the licensed key so as to avoid detection by a user. The license and covert keys are each associated with a device fingerprint that uniquely identifies the device transmitting each one of the respective keys. Unauthorized software usage at a client is determined at least when a covert key does not correspond to a device fingerprint having an associated license key.

2010-12-30

20100333208

SYSTEMS AND METHODS FOR RESOLVING CONFLICTS AND MANAGING SYSTEM RESOURCES IN MULTIMEDIA DELIVERY SYSTEMS - The invention manages resources and resolve conflicts when locally recording multimedia assets from a variety of sources in multimedia delivery systems. Local and system resources such as storage, tuners, and bandwidth are considered when alternative sources for assets are available (e.g., VOD). Rather than record assets locally, if equivalent assets are available via alternative sources, the recordings are deferred and a pointer to the equivalent asset is stored in lieu of the asset itself. When a user selects a multimedia asset for playback, an “on demand” or alternative source session is started for the asset associated with the pointer. Before the expiration date of the alternative source equivalent of the multimedia asset, it may be downloaded and recorded locally. The system may automatically determine based on various factors, such as transmission bandwidth, latency, and DRM, whether to store assets or pointers.

2010-12-30

20100333209

METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING PROTECTED CONTENT TO ONE OR MORE DEVICES BY REACQUIRING THE CONTENT FROM A SERVICE - An apparatus for providing protected content to a device(s) by reacquisition of the content from an entity of a service may include a processor and a memory storing executable computer program code that causes the apparatus to at least perform operations including determining one or more Digital Rights Management (DRM) formats that one or more devices support in response to receipt of an indication(s). The computer program code may cause the apparatus to arrange data identifying the devices based at least in part on the DRM formats that correspond to the devices. The computer program code may cause the apparatus to facilitate receipt of content in at least one DRM format that at least one of the devices supports in response to a determination that a first device was selected to provide the content to a device for rendering. Corresponding computer program products and methods are also provided.

2010-12-30

20100333210

METHODS AND APPARATUSES FOR SEQUESTERING CONTENT - In one embodiment, the methods and apparatuses sequester content receiving content for use in an application; review the content; automatically sequester the content from the application based on the reviewing; and form a reason associated with the sequestering the content. In another embodiment, the methods and apparatuses receive content for use with an application; determine whether the content is one of acceptable content and unacceptable content; remove the unacceptable content from the application; form an explanation for the unacceptable content; and store the unacceptable content and the explanation in an off-line storage device.

2010-12-30

20100333211

Method and system for providing digital media rental - There is provided a method and system for allocating access to digital media content. In one embodiment, the system may comprise a media server accessible over a communications network, a processor of the media server being configured to encrypt the digital media content to produce a secondary license for the digital media content, and to provide a temporary license key allowing a user to access at least a first portion of the digital media content during an activation usage interval of the secondary license for that portion of the digital media content assigned to the user. The media server further comprises an assignment database configured to store an assignment status of the license. Such a system is configured to permit the user to access the assigned portion of the digital media content during the usage interval.

2010-12-30

20100333212

PORTABLE PARAMETER-BASED LICENSING - Portable parameter-based licensing techniques are described. These techniques allow licenses to be decoupled from any particular host device and utilized in a portable and flexible fashion. In at least some embodiments, license data that includes a license to use computer-related functionality can be stored in a secure execution environment. The secure execution environment can be provided by a suitable secure execution environment hosting device(s) (SEHD), such as a portable flash memory device for instance. The license data in the secure execution environment can then be utilized to authorize use of the computer-related functionality, according to the license, on any number of host devices not responsible for providing the secure execution environment. As a result, the owner of the license can use the computer-related functionality without being restricted to any particular host device.

2010-12-30

20100333213

Systems and Methods for Determining Authorization to Operate Licensed Software Based on a Client Device Fingerprint - Methods and systems disclosed herein may be used to determine if licensed software has been previously installed or used on a device by monitoring an identifier associated with the device on which the licensed software is to be installed or used. Prior to operation of licensed software, a client device requires authorization from a license server. The license server may retrieve a unique identifying device fingerprint from the client device to authorize installation of the software based on a probabilistic comparison of the identifier with stored device identifiers subject to a license. If the comparison yields a match and if total instances of retrieval of the retrieved device fingerprint does not exceed licensed rights, the authorization is granted.

2010-12-30

20100333214

INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND CONTROL PROGRAM - An information processing apparatus in which an application managed by a license based on license data operates. The information processing apparatus includes a recording unit to record transfer information indicating that the license data is transferred from the information processing apparatus to a second information processing apparatus, and a prohibition unit to prohibit use in the information processing apparatus of the license data corresponding to the transfer information when the transfer information indicates that the license data has been transferred from the information processing apparatus to the second information processing apparatus.

2010-12-30

20100333215

ELECTRONIC DEVICE WITH STYLUS - An electronic device comprising: a main body and a stylus, wherein the main body comprises: a trigger, which is assigned identification information; a socket configured for receiving the stylus, wherein the socket defines a grooves on an inner surface thereof, and the grooves is configured for placement a trigger; and a processing unit configured for recognizing the identification information of the trigger to determine whether to lock or unlock the electronic device; the stylus comprises: a shank and a ring, wherein the ring is extended from the circumferential surface of the shank, a hook is formed in an end of the stylus, and a protrusion is protruded from the circumferential surface of the ring in alignment with the hook and is received in the groove to press the trigger when the stylus is inserted into the socket and the hook is aligned with the trigger.

2010-12-30

20100333216

Non-human gene-disrupted animal with disrupted Adam11 gene - It is an object of the present invention to provide a non-human gene-disrupted animal with a disrupted ADAM11 gene. According to the present invention, a non-human gene-disrupted animal, wherein either one of or both alleles of an ADAM11 gene are disrupted, is provided.

2010-12-30

20100333217

SCREENING METHOD FOR THE COMPOSITION FOR PREVENTION OR TREATMENT OF OSTEOPOROSIS AND METABOLIC BONE DISEASE USING TALLYHO/JNGJ MOUSE - Provided is a method for screening a composition for preventing or treating an osteoporosis and a metabolic bone disease using a TALLYHO/JngJ mouse, and more particularly, to a method for screening a compound effective in preventing and treating a disease caused by abnormalities of a bone metabolism including an osteoporosis, through assessment of a bone regeneration activity, such as acceleration of osteoblast differentiation, inhibition of osteoclast differentiation, variation of cytokine in a serum, as well as a bone mineral density and a bone mineral content in a femur, using a TALLYHO/JngJ mouse instead of a ovariectomized animal generally used in estimating the efficacy of a new osteoporosis medicine in an animal. The screening method has a simple and stable experiment procedure, and can be used in developing an agent for treating an osteoporosis of men and improving the bone mineral content. Therefore, the method can be used in estimating an indirect efficacy on the metabolic bone disease and the osteoporosis.

2010-12-30

20100333218

TRANSGENIC PROTEINS FROM MULTI-GENE SYSTEMS, METHODS, COMPOSITIONS, USES AND THE LIKE RELATING THERETO - A non-human transgenic mammalian animal, as described above, contains one or more exogenous double stranded DNA sequence(s) stably integrated into the genome of the animal, which comprises trans-acting regulatory units controlling expression of DNA sequences encoding proteins to be secreted into the milk of transgenic mammals. The DNA sequence of the trans-regulatory gene encodes transcriptional activating proteins, which are not secreted but made in a temporally controlled and mammary tissue specific manner. The DNA sequence containing the protein to be secreted in the milk is constructed on a separate gene sequence under the regulation of a minimal promoter and a trans-activation binding domain. The transgenic mammals are preferably pigs, cows, sheep, goats and rabbits. A related composition and method for making transgenic proteins which require specialized propeptides for proper post-translational processing is also described.

MUTATED HYPERTHERMOPHILIC PHOSPHOTRIESTERASES AND USES THEREOF - A subject of the present invention is mutated hyperthermophilic phosphotriesterases (PTEs) possessing a lactonase activity, and their uses as bioscavengers within the context of the decontamination of the surfaces of materials, of the skin or mucous membranes, contaminated with organophosphorus compounds, or within the context of the preparation of medicaments which can be used within the context of the prevention or treatment of an external contamination or of an internal poisoning by ingestion or inhalation by organophosphorus compounds, or within the context of the pollution control of water polluted with organophosphorus compounds.

2010-12-30

20100333222

KNOCKOUT MICE FOR A P450 GENE CLUSTER - The invention relates to the generation of mouse models of drug metabolism in which clusters of genes that are involved in drug metabolism have been knocked out. The development of new drugs and chemicals for therapeutic use or for other purposes is extremely complex. Of particular importance is the understanding of how these chemical agents are handled in the body, whether they have appropriate pharmacokinetics and whether, as a consequence of metabolism, any safety issues arise. Many of the proteins that are involved in the metabolism, disposition and elimination of drugs are members of multigene families that exhibit very marked species differences in gene number, function and regulation. For these reasons, experiments carried out in laboratory animals to establish routes of metabolism or toxicity can be severely compromised and, as a consequence, do not faithfully represent the human situation. One example of this complexity is reflected in the mammalian cytochrome P450 system, where the sizes of multigene families of proteins which carry out particular metabolic functions vary enormously between species.

2010-12-30

20100333223

CARBOHYDRATE BINDING PLANT HYDROLASES WHICH ALTER PLANT CELL WALLS - The present invention discloses a transgenic plant cell which includes a nucleic acid construct. The nucleic acid construct contains a nucleic acid molecule encoding a plant endo-1,4-β-xylanase and/or a plant endo-1,4-β-glucanase, where the plant endo-1,4-β-xylanase and/or the plant endo-1,4-β-glucanase each have a modular carbohydrate binding domain, or multiple modular carbohydrate binding domains. The nucleic acid construct also includes a plant promoter and a plant termination sequence, where the plant promoter and the plant termination sequence are operably coupled to the nucleic acid molecule and at least one of the plant promoter or the plant termination sequence is heterologous to the nucleic acid molecule. The present invention also relates to methods of producing transgenic plants, polysaccharide depolymerizing the transgenic plants and non-transgenic plants, and identifying plants capable of undergoing enhanced polysaccharide depolymerization.

2010-12-30

20100333224

PEPPER HYBRID BS02828008 - The invention provides seed and plants of pepper hybrid BS02828008 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid BS02828008 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants.

2010-12-30

20100333225

PEPPER HYBRID BS02827975 - The invention provides seed and plants of pepper hybrid BS02827975 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid BS02827975 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants.

2010-12-30

20100333226

PEPPER HYBRID BS02827989 - The invention provides seed and plants of pepper hybrid BS02827989 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid BS02827989 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants.

2010-12-30

20100333227

PEPPER HYBRID BS02838720 - The invention provides seed and plants of pepper hybrid BS02838720 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid BS02838720 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants.

2010-12-30

20100333228

PLANT CAPABLE OF BEARING SEEDLESS FRUITS AND METHOD OF PRODUCING VARIETY BEARING SEEDLESS FRUIT - Provided are a plant capable of bearing seedless fruits stably over several generations, a seedless fruit generated from this plant, a method of producing a variety capable of readily and reliably bearing seedless fruits, a variety produced by this production method, and a seedless fruit generated from the thus produced variety. Particularly provided is a plant capable of bearing seedless fruits, wherein the plant is obtained by a crossing method comprising a step (a) of selecting a first filial generation plant which is capable of bearing seedless fruits as well as having a male sterile trait and a parthenocarpic trait from the group of first filial generation plants generated by crossing between a plant of a male sterile line and a plant of a parthenocarpic line, and a step (b) of crossing the thus selected first filial generation plant with a plant of a fixed line which is capable of sustaining the parthenocarpic trait and the male sterile trait of the plant, as a pollen parent, to thereby generate a progeny plant having the parthenocarpic trait and the male sterile trait.

2010-12-30

20100333229

Soybean Cultivar 2229021658 - A soybean cultivar designated 2585921658 is disclosed. The invention relates to the seeds of soybean cultivar 2585921658, to the plants of soybean 2585921658, to plant parts of soybean cultivar 2585921658 and to methods for producing a soybean plant produced by crossing soybean cultivar 2585921658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 2585921658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 2585921658 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 2585921658 with another soybean cultivar.

2010-12-30

20100333230

CLOSTEROVIRUS VECTORS AND METHODS - The present disclosure relates to the development and use of Closterovirus-based vectors for the delivery of nucleotides to plants. Specifically, the present disclosure provides viral vectors based on Grapevine leafroll-associated virus-2 for the delivery and expression of genes in plants, particularly grape plants. Methods of making and using these vectors, as well as the plants transformed by these vectors, are also contemplated.

ALTERATION OF FLOWERING TIME IN PLANTS - The present invention provides genetic identification and use information about a family of genes, the FLOWERING LOCUS C (FLC) genes, that is part of the regulate the timing of the onset of flowering in plants. This information enables creation of transgenic plants in which the timing of the flowering of the plants has been selectively altered. Since these genes natively act to delay the time of flowering in plants, enhancing activity of the FLC protein delays the timing of flowering initiation while inhibiting the activity of FLC advances the timing of the start of flowering. A representative number of samples of the gene family are described. Members of the gene family are demonstrated to work in other plant species as well.

2010-12-30

20100333233

Cottonwood Growth eIF-5A - The present invention relates to unique isoforms of eukaryotic initiation Factor 5A (“eIF-5A”): senescence-induced eIF-5A; wounding/pathogen induced eIF-5A; stress eIF-5A and growth eIF-5A, as well as polynucleotides that encode these three factors. The present invention also relates to methods involving modulating the expression of these factors. The present invention also relates to deoxyhypusine synthase (“DHS”), polynucleotides that encode DHS, and methods involving modulating the expression of DHS.

2010-12-30

20100333234

Transgenic Plants with Increased Stress Tolerance and Yield - Polynucleotides are disclosed which are capable of enhancing a growth, yield under water-limited conditions, and/or increased tolerance to an environmental stress of a plant transformed to contain such polynucleotides. Also provided are methods of using such polynucleotides and transgenic plants and agricultural products, including seeds, containing such polynucleotides as transgenes.

2010-12-30

20100333235

Plant Centromere Compositions - The present invention provides for the nucleic acid sequences of plant centromeres. This will permit construction of stably inherited recombinant DNA constructs and minichromosomes which can serve as vectors for the construction of transgenic plant and animal cells.

2010-12-30

20100333236

INSECT INHIBITING PLANT SERPIN MUTANTS - The present invention relates to a method to limit insect and/or mite damage in plants, by the use of mutant plant proteinase inhibitors. More specifically, it relates to the use of mutant serpins of which the reactive center loop has been replaced by an artificial sequence. Preferably, the mutant serpins use an

2010-12-30

20100333237

METHOD FOR PROTECTING PLANTS FROM STRESS AND SENESCENCE - The present invention relates to regulation of ureide levels for optimal plant survival during nutrient remobilization such as occurs during normal growth, dark stress and senescence. Plants can be genetically engineered or selected using a suitable gene marker to have enhanced ureide accumulation. The present invention further provides methods of protecting plants, or extending the shelf life of fresh plant produce by application of exogenous ureides.

2010-12-30

20100333238

Method For Inducing Resistance To Fungal Infection In Transgenic Plants Using Plant Defense Peptides - A method for the identification of peptides having an affinity for the surface of fungi is provided as is a method for the identification of peptides capable of affecting the development of a fungus. Also provided are compositions comprising peptides identified using the method of the present invention. In addition, isolated polynucleotides, vectors, expression cassettes and transformed cells capable of expressing peptides identified by the method of the present invention are provided. Such polynucleotides, vectors, expression cassettes may be introduced into and confer upon plants the capability to resist fungal infection.

Fully Digitally Controller for Cantilever-Based Instruments - A controller for cantilever-based instruments, including atomic force microscopes, molecular force probe instruments, high-resolution profilometers and chemical or biological sensing probes. The controller samples the output of the photo-detector commonly used to detect cantilever deflection in these instruments with a very fast analog/digital converter (ADC). The resulting digitized representation of the output signal is then processed with field programmable gate arrays and digital signal processors without making use of analog electronics. Analog signal processing is inherently noisy while digital calculations are inherently “perfect” in that they do not add any random noise to the measured signal. Processing by field programmable gate arrays and digital signal processors maximizes the flexibility of the controller because it can be varied through programming means, without modification of the controller hardware.

2010-12-30

20100333241

Kiwifruit variety named 'ZESH004' - A new and distinct kiwifruit variety is disclosed. The variety results from selection among a population of seedlings derived from crossing the kiwifruit selections known as 40-10-14e.92 (not patented,

2010-12-30

20100333242

Kiwifruit variety named 'ZESY003' - A new and distinct kiwifruit variety is disclosed. The variety results from selection among a population of seedlings derived from crossing the kiwifruit selections known as Kuimi 79-1-1 (not patented) and 30-03-05c.94 (not patented). The fruit of this new kiwifruit variety is characterized by moderate to large fruit size, high natural yield potential, ovoid shape, yellow flesh color, and potential for long storage. The new kiwifruit variety has been named ‘ZESY003’.

2010-12-30

20100333243

Kiwifruit variety named 'ZESY002' - A new and distinct kiwifruit variety is disclosed. The variety results from selection among a population of seedlings derived from crossing the kiwifruit selections known as 13-12-16d.96 (not patented) and 30-01-10c.94 (not patented). The fruit of this new kiwifruit variety is characterized by large fruit size, high yield potential, ovoid shape, yellow flesh color, and early harvest maturity. The new kiwifruit variety has been named ‘ZESY002’.